CN105931330A - Intelligent unlocking method and intelligent lock - Google Patents
Intelligent unlocking method and intelligent lock Download PDFInfo
- Publication number
- CN105931330A CN105931330A CN201610245086.3A CN201610245086A CN105931330A CN 105931330 A CN105931330 A CN 105931330A CN 201610245086 A CN201610245086 A CN 201610245086A CN 105931330 A CN105931330 A CN 105931330A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- lock
- bluetooth
- instruction
- unblank
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Abstract
The invention provides an intelligent unlocking method and an intelligent lock. The intelligent unlocking method comprises the following steps: receiving a first unlocking instruction transmitted by a mobile terminal via a Bluetooth trusted communication interface; acquiring intensity of a Bluetooth signal and determining whether the intensity of the Bluetooth signal meets a preset condition; acquiring and verifying terminal information in the first unlocking instruction if the preset condition is met; and carrying out unlocking operation in response to the first unlocking instruction when verification of the terminal information is succeed. According to the invention, the unlocking instruction transmitted by a Bluetooth module in the mobile terminal is used for unlocking, so unlocking operation can be omitted, time is saved, and convenience is obtained; and unlocking can be carried out via the carried mobile terminal without any extra unlocking tool, which enables convenience to be further improved.
Description
Technical field
The present invention relates to technical field of security and protection, specifically, the present invention relates to a kind of Intelligent unlocking method
And smart lock.
Background technology
Along with the development of large scale integrated circuit technology, occur in that the intelligent cipher with microprocessor
Locking, it also introduces the function of intelligentized control method in addition to the function with electronic password lock, so that
Coded lock has the highest safety, reliability, applies increasingly extensive.
Traditional smart lock, needs user at lock end by fingerprint recognition, iris identification, Password Input
Just can complete to unblank Deng unlocking operation, this mode of unblanking also exists the shortcoming lost time, convenience
The highest;And complete to unblank by the unlocking tool (such as integrated circuit card) with integrated circuit, though
So save the time of unlocking operation, additionally carried unlocking tool yet with needs, bring to user
Certain inconvenience, convenience is poor.
Summary of the invention
The purpose of the present invention is intended at least can solve one of above-mentioned technological deficiency, especially with facility
The technological deficiency that property is the highest.
The present invention provides a kind of Intelligent unlocking method, is applied to lock end, comprises the steps:
Trust the first of communication interface reception mobile terminal transmission by bluetooth to unblank to instruct;
Obtain Bluetooth signal intensity, and it is pre-conditioned to judge whether Bluetooth signal intensity meets;
When meeting pre-conditioned, obtain first unblank instruction in end message and verify;
When described end message is proved to be successful, response the first instruction of unblanking carries out unlocking operation.
In the present invention, described end message includes the unique identification information of described mobile terminal or authorizes account
Number information.
In the present invention, described mandate account information includes the mandate account directly authorized by lock end or by having
There is the temporary Authorization account that the mobile terminal of authorization privilege authorizes indirectly.
In the present invention, by the trust user profile prestored, end message is verified.
In the present invention, described in the trust user profile that prestores include the trust user profile more than one group,
Between the user of different groups, there is different user rights.
In the present invention, described in the pre-storage method of trust user profile that prestores include:
Set up the Trusted channel with mobile terminal;
Obtain the user profile that mobile terminal provides;
Give the corresponding user right of user of described user profile and be stored as trusting user profile.
In the present invention, described foundation includes with the Trusted channel of mobile terminal:
Set up the bluetooth Trusted channel with mobile terminal;
Or
By showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
In the present invention, trust the first of communication interface reception mobile terminal transmission by bluetooth and unblank to instruct
Before, also include the step judging duty, when duty is normal condition, just perform logical
Cross bluetooth and trust the step that the first of communication interface reception mobile terminal transmission is unblanked to instruct.
In the present invention, when duty is normal condition, also execute the following steps:
Trust the second of communication interface reception bluetooth link terminal transmission by bluetooth to unblank to instruct;
Obtain second unblank instruction in end message and verify;
When described end message is proved to be successful, response the second instruction of unblanking carries out unlocking operation;
Wherein, the remote unlocking instruction that described bluetooth link terminal sends for receiving mobile terminal, and
Generate the second of blue-teeth data form according to the instruction of described remote unlocking to unblank to instruct.
In the present invention, the remote unlocking that described bluetooth link terminal forwards for receiving local router refers to
Order, and unblank to instruct according to the second of described remote unlocking instruction generation blue-teeth data form;Wherein,
The instruction of described remote unlocking is sent to described local router by mobile terminal by telecommunication passage.
In the present invention, described telecommunication passage includes mobile data network or WiFi network.
In the present invention, when duty is guard mode, refusal response described first is unblanked to instruct.
In the present invention, described first unblanks instructs as described mobile terminal after checking finger print information success
Send.
In the present invention, described first unblank instruction identifying default incoming event for described mobile terminal
Rear transmission.
In the present invention, described unlocking operation includes that locking end directly unblanks or lock end to provide that manually unblanks to permit
Permitted.
In the present invention, described unlocking operation is for opening the first lock;
When described end message is proved to be successful, response first is unblanked after instruction carries out unlocking operation,
Further comprise the steps of: identification and verify finger print information, and after being proved to be successful, opening the second lock.
In the present invention, described end message is interrelated with described finger print information.
In the present invention, if the outdoor finger print information identification module identification that described finger print information is lock end, then
In described identification and verify finger print information, and after opening the step of the second lock after being proved to be successful, enter
Enter no longer to respond the state that the first of described mobile terminal unblanks to instruct, and at the indoor fingerprint letter of lock end
Breath identification module opens described first lock and the second lock after re-recognizing and verify finger print information success.
In the present invention, the indoor finger print information identification module at lock end re-recognizes and verifies finger print information
After opening described first lock and the second lock after success, exit no longer responding the first of described mobile terminal and open
The state of lock instruction.
In the present invention, when be simultaneously received the transmission of more than one mobile terminal first unblanks instruction,
If the outdoor finger print information identification module identification that described finger print information is lock end, then in described identification and test
Card finger print information, and after being proved to be successful after the step of unlatching the second lock, enter no longer response described
In more than one mobile terminal the first of arbitrary mobile terminal unblank instruction state, and lock end room
Interior finger print information identification module re-recognizes and verifies and arbitrary shifting in described more than one mobile terminal
Described first lock and the second lock is opened after the finger print information success that dynamic terminal is associated.
The present invention also provides for a kind of smart lock, including:
Receiver module, unblanks for trusting the first of communication interface reception mobile terminal transmission by bluetooth
Instruction;
Monitoring modular, is used for obtaining Bluetooth signal intensity, and it is pre-to judge whether Bluetooth signal intensity meets
If condition;
Authentication module, when meeting pre-conditioned, for obtaining the first end message unblanked in instruction
And verify;And
Perform module, when described end message is proved to be successful, carry out for response the first instruction of unblanking
Unlocking operation.
In the present invention, described end message includes the unique identification information of described mobile terminal or authorizes account
Number information.
In the present invention, described mandate account information is by locking mandate account that end directly authorizes or being awarded by having
The temporary Authorization account that the mobile terminal of power authority authorizes indirectly.
In the present invention, also include for the pre-storing module trusting user profile that prestores, described authentication module
By the trust user profile prestored, end message is verified.
In the present invention, described in the trust user profile that prestores include the trust user profile more than one group,
Between the user of different groups, there is different user rights.
In the present invention, described pre-storing module is used for:
Set up the Trusted channel with mobile terminal;
Obtain the user profile that mobile terminal provides;
Give the corresponding user right of user of described user profile and be stored as trusting user profile.
In the present invention, described foundation includes with the Trusted channel of mobile terminal:
Set up the bluetooth Trusted channel with mobile terminal;
Or
By showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
In the present invention, also including judge module, described judge module is for passing through at described receiver module
Bluetooth is trusted before the first of communication interface reception mobile terminal transmission is unblanked to instruct and is judged duty,
When duty is normal condition, described receiver module is just trusted communication interface by bluetooth and is received shifting
The first of dynamic terminal transmission unblanks to instruct.
In the present invention, when duty is normal condition:
Receiver module is additionally operable to trust that communication interface receives that bluetooth link terminal sends by bluetooth the
Two unblank instructs;
Authentication module is additionally operable to obtain second and unblanks the end message in instruction verifying;
When described end message is proved to be successful, performs module and be additionally operable to respond the second instruction of unblanking and carry out
Unlocking operation;
Wherein, the remote unlocking instruction that described bluetooth link terminal sends for receiving mobile terminal, and
Generate the second of blue-teeth data form according to the instruction of described remote unlocking to unblank to instruct.
In the present invention, the remote unlocking that described bluetooth link terminal forwards for receiving local router refers to
Order, and unblank to instruct according to the second of described remote unlocking instruction generation blue-teeth data form;Wherein,
The instruction of described remote unlocking is sent to described local router by mobile terminal by telecommunication passage.
In the present invention, described telecommunication passage includes mobile data network or WiFi network.
In the present invention, when duty is guard mode, described execution module refusal response described the
One unblanks instructs.
In the present invention, described first unblanks instructs as described mobile terminal after checking finger print information success
Send.
In the present invention, described first unblank instruction identifying default incoming event for described mobile terminal
Rear transmission.
In the present invention, described unlocking operation includes that locking end directly unblanks or lock end to provide that manually unblanks to permit
Permitted.
In the present invention, described smart lock includes the first lock and the second lock, also includes finger print information identification mould
Block;
Described unlocking operation is for opening the first lock;
When described end message is proved to be successful, response first is unblanked after instruction carries out unlocking operation,
Described finger print information identification module identification also verifies finger print information, and described execution module is after being proved to be successful
Open the second lock.
In the present invention, described end message is interrelated with described finger print information.
In the present invention, described finger print information identification module includes outdoor finger print information identification module and indoor
Finger print information identification module;
If described finger print information is described outdoor finger print information identification module identification, then refer in described outdoor
Stricture of vagina information identification module identification also verifies that finger print information and described execution module are opened after being proved to be successful
Second lock after, described execution module enter no longer respond the first of described mobile terminal unblank instruction
State, and open after described indoor finger print information identification module re-recognizes and verify finger print information success
Open described first lock and the second lock.
In the present invention, re-recognize and verify that finger print information becomes at described indoor finger print information identification module
After opening described first lock and the second lock after merit, described execution module exits and no longer responds described movement eventually
End first unblank instruction state.
In the present invention, when described receiver module is simultaneously received first that more than one mobile terminal sends
When unblanking to instruct, if described finger print information is described outdoor finger print information identification module identification, then in institute
State outdoor finger print information identification module identification and verify that finger print information and described execution module are being verified into
After opening the second lock after merit, described execution module enters and no longer responds described more than one mobile terminal
In the first state unblanking instruction of arbitrary mobile terminal, and at described indoor finger print information identification module
Re-recognize and verify the fingerprint being associated with arbitrary mobile terminal in described more than one mobile terminal
Described first lock and the second lock is opened after information success.
Above-mentioned Intelligent unlocking method and smart lock, trust communication interface by bluetooth and receive mobile terminal
First sent unblanks to instruct;Obtain Bluetooth signal intensity, and judge whether Bluetooth signal intensity meets
Pre-conditioned;When meeting pre-conditioned, obtain first unblank instruction in end message and verify;
When described end message is proved to be successful, response the first instruction of unblanking carries out unlocking operation;Utilize mobile
The bluetooth module of terminal transmits instruction of unblanking and goes to unblank, and can save unlocking operation, saves the time, just
Profit is preferable;And can realize unblanking just with the mobile terminal carried with, it is not necessary to use
Extra unlocking tool, convenience improves further.
Aspect and advantage that the present invention adds will part be given in the following description, and these will be from following
Description in become obvious, or recognized by the practice of the present invention.
Accompanying drawing explanation
Present invention aspect that is above-mentioned and/or that add and advantage are from retouching embodiment below in conjunction with the accompanying drawings
Will be apparent from easy to understand in stating, wherein:
Fig. 1 is the Intelligent unlocking method schematic diagram of an embodiment;
Fig. 2 is the method schematic diagram of Intelligent unlocking in normal state of an embodiment;
Fig. 3 is the smart lock module diagram of an embodiment.
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, its
In the most same or similar label represent same or similar element or have same or like
The element of function.The embodiment described below with reference to accompanying drawing is exemplary, is only used for explaining this
Invention, and be not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative used herein
" one ", " one ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that
The wording used in the description of the present invention " includes " referring to there is described feature, integer, step, behaviour
Make, element and/or assembly, but it is not excluded that existence or add other features one or more, whole
Number, step, operation, element, assembly and/or their group.It should be understood that when we claim element
Being " connected " or during " coupled " to another element, it can be directly connected or coupled to other elements, or
Intermediary element can also be there is in person.Additionally, " connection " used herein or " coupling " can include wireless
Connect or wireless couple.Wording "and/or" used herein includes that what one or more was associated lists
Whole or any cell of item and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein
(including technical term and scientific terminology), have and the those of ordinary skill in art of the present invention
Be commonly understood by identical meaning.Should also be understood that those arts defined in such as general dictionary
Language, it should be understood that there is the meaning consistent with the meaning in the context of prior art, and remove
Non-as here by specific definitions, otherwise will not with idealization or the most formal implication explain.
Those skilled in the art of the present technique be both appreciated that " terminal " used herein above, " terminal unit "
Including the equipment of wireless signal receiver, it only possesses the setting of wireless signal receiver of non-emissive ability
Standby, include again the equipment receiving and launching hardware, it has and can perform on bidirectional communication link
The reception of two-way communication and the equipment of transmitting hardware.This equipment may include that honeycomb or other communication
Equipment, its have single line display or multi-line display or the honeycomb not having multi-line display or
Other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System),
It can process with combine voice, data, fax and/or its communication ability;PDA(Personal
Digital Assistant, personal digital assistant), it can include radio frequency receiver, pager, mutually
The access of networking/Intranet, web browser, notepad, calendar and/or GPS (Global Positioning
System, global positioning system) receptor;Conventional laptop and/or palmtop computer or other set
Standby, its have and/or include the conventional laptop of radio frequency receiver and/or palmtop computer or other
Equipment." terminal " used herein above, " terminal unit " can be portable, can transport, be arranged on
In the vehicles (aviation, sea-freight and/or land), or it is suitable for and/or is configured in this locality
Run, and/or with distribution form, any other position operating in the earth and/or space is run.This
In " terminal ", " terminal unit " that used can also is that communication terminal, access terminals, music/video
Playback terminal, such as, can be that (Mobile Internet Device, mobile Internet sets for PDA, MID
Standby) and/or there is the mobile phone of music/video playing function, it is also possible to it is intelligent television, machine top
The equipment such as box.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above, and it includes
But it is not limited to computer, network host, single network server, multiple webserver collection or multiple
The cloud that server is constituted.Here, cloud is by a large amount of calculating based on cloud computing (Cloud Computing)
Machine or the webserver are constituted, and wherein, cloud computing is the one of Distributed Calculation, by the loose coupling of a group
One super virtual machine of the computer collection composition closed.In embodiments of the invention, far-end network
Can realize communicating by any communication mode between equipment, terminal unit with WNS server, including
But it is not limited to, mobile communication based on 3GPP, LTE, WIMAX, based on TCP/IP, UDP
The computer network communication of agreement and based on bluetooth, the low coverage side of being wirelessly transferred of infrared transmission standard
Formula.
Fig. 1 is the Intelligent unlocking method schematic diagram of an embodiment.
The present invention provides a kind of Intelligent unlocking method, is applied to lock end, comprises the steps:
Step S100: judge duty.
Lock end can be preset with multiple duty.Here duty, for locking the duty of end,
Multiple predefined or user-defined duty can be included, such as, can include normal shape
State, guard mode, mode state etc. is set.In the following description, the main lock end that describes is in work
Time normal condition and guard mode, and lock the end setting when user setup parameter or user profile
Mode state.It is appreciated that duty can also include other duties freely defined.
Normal condition, is defined as locking end state in which normal use when, in this condition,
All unlocking functions of lock end can be used.And guard mode, then it is defined as locking end in protection
State in which under pattern, in this condition, the part unlocking function of lock end is rejected use.Refused
The part unlocking function used absolutely can be arranged voluntarily by user, it is also possible to pre-when being product export
If.Such as, when family have child and be grown up cannot guard at any time time, need in view of safety factors
And the unlocking function that part is easily used by child is disabled, this kind of unlocking function such as includes by moving
The function that dynamic terminal Bluetooth is unblanked, the function unblanked by integrated circuit card or only by password with regard to energy
The function unblanked.
Accordingly, it would be desirable to the duty of lock end is judged, when locking end and being operated in normal condition,
Carry out step S110;When locking end and being operated in guard mode, perform step S112.Step S112:
When duty is guard mode, lock end refusal response first is unblanked to instruct.Namely work as duty
During for guard mode, even if locking second that end receives first and unblanks to instruct or be described below
Unblank to instruct, all without responding.
Step S110: trust the first of communication interface reception mobile terminal transmission by bluetooth and unblank to refer to
Order.Mobile terminal can be smart mobile phone, intelligent watch, panel computer etc. portable set.
Bluetooth trusts communication interface it can be understood as lock end carried out bluetooth with mobile terminal the most in advance
The communication interface matched and formed.Such as, lock end and mobile terminal have arrived in user's hands user again by it
Bluetooth pairing.Through lock end and the mobile terminal of a Bluetooth pairing, it is equivalent to bluetooth pre-established
Trust communication interface, so lock end and mobile terminal can directly build when bluetooth connects upper once carrying out
Vertical Trusted channel, no longer carries out Bluetooth pairing.
Therefore, first to unblank to instruct be packet based on Bluetooth protocol.In order to reduce energy consumption, permissible
Use bluetooth low energy consumption (BLE) technology.BLE technology uses interval of variable Connection Time, this
Every could be arranged to several milliseconds to several seconds according to concrete application.It addition, because BLE technology is adopted
By very quickly connected mode, may be at the most at ordinary times " disconnected " state (Standby,
Holding state) to reduce energy consumption, now both link ends the most simply knows the other side, only in necessity
Time just open link, then within the shortest time close link.Therefore, mobile terminal is not
Need to send first to unblank to may be at holding state when of instruction, send first at needs and unblank to refer to
Time the when of order (after such as identifying corresponding incoming event), mobile terminal switches from holding state
To broadcast state to send broadcast message.Mobile terminal is during sending broadcast message, it is common that in advance
If broadcast duration periodically send broadcast message.
First instruction of unblanking includes unblank code and end message.End message includes that mobile terminal is only
One identification information or mandate account information.In the present embodiment, account information is authorized to include by lock end straight
The mandate account connecing mandate or the temporary Authorization account indirectly authorized by the mobile terminal with authorization privilege
Number.
The unique identification information of mobile terminal, for uniquely identifying mobile terminal, can be mobile terminal
Physical address (MAC), it is also possible to be the IMEI of mobile terminal.When end message includes mobile whole
During the unique identification information held, the unique identification information of the mobile terminal of lock end checking, and verifying into
Just unblank after merit, as long as in other words lock end identifies mobile terminal and can unblank.
Authorizing account information can be divided into two kinds, the first is the mandate account directly authorized by lock end,
The second is the mandate account indirectly authorized by the mobile terminal with authorization privilege.The first can be
The mandate account of lock end direct giving mobile terminal when that lock end and mobile terminal setting up data cube computation,
This mandate account is stored in white list by locking end, belongs to permanent effective account;The second can be
The temporary Authorization account given to other mobile terminals again by the mobile terminal directly authorized by lock end
Number, temporary Authorization account here can be that mobile terminal is according to authorizing account and the create-rule preset
(algorithm) generates, and this temporary Authorization account, can be by owing to having mapping contact with authorizing account
Lock end identification, belongs to the effective account of short-term or disposable account (be used only once or for several times).
Such as, for mobile terminal 1, the lock direct giving mobile terminal of end 1 forever effectively authorizes account
Number A, mobile terminal 1 can use mandate account A to unblank;Mobile terminal 1 can also basis
Account A and generating algorithm K preset is authorized to generate temporary Authorization account a, and by temporary Authorization account
A is sent to mobile terminal 2, and mobile terminal 2 re-uses temporary Authorization account a and unblanks, and lock end is being received
After temporary Authorization account a, generating algorithm K is utilized to identify as authorizing account A indirectly to authorize
Account, thus lock end and unblank so that mobile terminal 2 can utilize temporary Authorization account a to unblank.
Temporary Authorization account a is the effective account of short-term or disposable account, such as can only be in 5 minutes
Effectively or be used only once or for several times.
When temporary Authorization account a is the effective account of short-term, mobile terminal 1 needs to authorize account
The generation moment T of a sends a mobile terminal 2, and therefore lock end and mobile terminal 1 need have synchronization
Time, this can pre-set lock in time.Such as at T sometime, mobile terminal 1
According to authorizing account A, generating algorithm K and generating moment T generation temporary Authorization account a, lock end obtains
Generating algorithm K is utilized to identify mandate account A and generate moment T after taking temporary Authorization account a, from
And the effective time generating moment T deduction temporary Authorization account a can be utilized.
First unblank instruction the pattern of BLE broadcast message can be used to send.
In BLE technology, usual broadcast message has a data below structure:
Preamble | Access Address | PDU | CRC |
1 (byte) | 4 (bytes) | 2-39 (byte) | 3 (bytes) |
0x25 |
Preamble is preamble, and Access Address is reference address, and PDU is payload
Data, CRC is check code.
PDU data has a data below structure:
Wherein Header is data head, and Payload is load data.Payload is divided into two parts,
AdvA is broadcast address, and AdvData is broadcast data.Header generally includes broadcast-type information,
Such as:
ADV_IND: omnidirectional broadcast can be connected
ADV_DIRECT_IND: directional broadcasting can be connected
ADV_NONCONN_IND: omnidirectional broadcast can not be connected
ADV_SCAN_IND: omnidirectional broadcast can be scanned
Therefore, the physical address (MAC) of mobile terminal can be positioned over AdvA, and code of unblanking
And/or end message (such as authorizing account information) can be positioned over AdvData.
In the present embodiment, first unblanks, and can be mobile terminal send out after checking finger print information success in instruction
Send.Namely it is front to unblank to instruct (step S110) in transmission first, mobile terminal may require that acquisition
The finger print information of user is also verified, unblanks instruction by just sending first after fingerprint authentication.First unblanks
Instruction can be that mobile terminal sends after identifying default incoming event, i.e. user enters at mobile terminal
Just send first after the corresponding input operation of row to unblank to instruct.First instruction of unblanking can also be to move
Terminal begins to send voluntarily the when of lock end being detected.
Below instruction of only unblanking to first is illustrated, and in fact the first instruction of unblanking can be it
His data mode, as long as meeting Bluetooth protocol.After step S110, perform step S120.
Step S120: obtain Bluetooth signal intensity, and it is default to judge whether Bluetooth signal intensity meets
Condition.Bluetooth signal intensity can represent by RSSI value, lock end get first unblank instruction after,
Bluetooth signal intensity level can be obtained, and it is pre-conditioned to judge whether Bluetooth signal intensity meets.Obtain
The technology of Bluetooth signal intensity belongs to common technology, does not repeats them here.The size of Bluetooth signal intensity
There are close ties with standoff distance, may determine that mobile terminal by the size judging Bluetooth signal intensity
And the distance between lock end;If the distance between mobile terminal and lock end is less (e.g., less than
10cm), show that mobile terminal is intended to unblank by user near lock end.When mobile terminal and lock end
Between distance less time just think that user intends to unblank, the phenomenon opening by mistake lock can be prevented effectively from, finish
Unexpectedly the coverage of Bluetooth signal is bigger (tens meters even tens meters).
When Bluetooth signal intensity meets pre-conditioned, show that mobile terminal is the least with the distance of lock end
In predeterminable range (such as 10cm), show that mobile terminal is intended to unblank by user near lock end,
Now can perform step S130.
Step S130: when meeting pre-conditioned, obtains the first end message unblanked in instruction also
Checking.End message can be verified by lock end by the trust user profile prestored, the letter prestored
Appoint user profile to include the trust user profile more than one group, have different between the user of different groups
User right.Such as, the trust user profile prestored can include manager, member two groups.Management
The manager of member's group has unlocking authority, the authority giving other mobile terminal temporary Authorization accounts and pipe
The authority of reason lock end, and the member of member's group only has unlocking authority.
By verifying the unique identification information of the mobile terminal in above-mentioned end message or authorizing account to believe
Whether breath is present in the trust user profile prestored, and judges whether mobile phone users has and unblanks
Authority.Being present in which group, user then has the user right that this group is corresponding.Mandate as escribed above
Account A belongs to the trust user of group of administrators, and other move end therefore to authorize account A to have imparting
The authority of end temporary Authorization account.
The trust user profile prestored can utilize following pre-storage method to realize: initially sets up with mobile
The Trusted channel of terminal, then obtains the user profile that mobile terminal provides, finally gives user profile
The corresponding user right of user and be stored as trust user profile.In the present embodiment, set up with mobile
The Trusted channel of terminal, may is that the bluetooth Trusted channel set up with mobile terminal;Or may is that
By showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
In brief, lock end data cube computation during user profile is trusted in storage, can be by indigo plant
The mode of tooth communication and mobile terminal are set up bluetooth Trusted channel and are realized, when lock end is joined with mobile terminal
To rear, its end message is sent to lock end and trusts user profile to be formed by mobile terminal;Or,
Mobile terminal (can be implied with unique mark of lock end by the 2 D code information that scanning lock end is shown
Information) realize and connection and the binding locking end, and be sent to its end message lock end to form letter
Appoint user profile.
After step S130, step S140 can be performed.
Step S140: when end message is proved to be successful, response first instruction of unblanking is carried out unblanking behaviour
Make.Unlocking operation includes that locking end directly unblanks or lock end to provide the permission manually unblanked.Directly unblanking can
Being directly to open lock end so that door is opened;Allowing that lock end offer is manually unblanked is to represent lock end
Needing door just to be made to open through manually unblanking after unlocking operation, lock end cannot before unlocking operation
Manually unblank.
In order to improve the safety of lock end, lock end can include the first lock and the second lock, and includes referring to
Stricture of vagina information identification module.Unlocking operation can be to open the first lock in certain embodiments.Step S140
Afterwards, it is also possible to include step: identify and verify finger print information, and after being proved to be successful, open second
Lock.
Open the first lock by checking end message, open the second lock by checking finger print information, therefore
End message and finger print information can be to be mutually related, i.e. end message and finger print information has mapping
Relation.
When Bluetooth signal intensity meets pre-conditioned, show that mobile terminal is the least with the distance of lock end
In predeterminable range, show that mobile terminal is intended to unblank by user near lock end, above-mentioned preset away from
From can be very close to distance, such as 10cm;Can also be nearer distance, such as 1~2 meter.
Therefore, if predeterminable range is nearer distance, mobile terminal can need not lock end, and
When mobile terminal is from lock end 1~the distance of 2 meters, lock end can automated to respond to end message and unblanks, more
Add conveniently.But, if user carries mobile terminal and enters indoor, if now in indoor through lock
End, then be relatively easy to open by mistake lock or the situation of mobile terminal prompting by mistake.
Therefore, finger print information identification module can include outdoor finger print information identification module and indoor fingerprint
Information identification module, and avoid the above-mentioned feelings opening by mistake lock or mobile terminal prompting by mistake in the following manner
Condition:
If finger print information be lock end outdoor finger print information identification module identification, then step S140 it
After, enter and no longer respond the state that the first of mobile terminal unblanks to instruct, and at the indoor fingerprint of lock end
Information identification module opens the first lock and the second lock after re-recognizing and verify finger print information success.
Under aforesaid way, user carries mobile terminal and unblanks to enter behind indoor, even if user carries shifting
Dynamic terminal is in indoor near lock end, and what lock end also will not respond that mobile terminal sends first unblanks to refer to
Make and auto-unlocking;If user goes out, even if not carrying mobile terminal, user can also be in indoor
By fingerprint, in indoor, realization is unblanked.If user carries mobile terminal and unblanks to go out by fingerprint,
Then need to exit and no longer respond the state that the first of described mobile terminal unblanks to instruct, to facilitate under user
Secondary return to unblank.Therefore, the indoor finger print information identification module at lock end re-recognizes and verifies fingerprint
After opening the first lock and the second lock after information success, exit no longer responding the first of described mobile terminal and open
The state of lock instruction.
Under aforesaid way, it should also be taken into account that multiple user carries the feelings of mobile device that can be used for unblanking
Condition.When be simultaneously received the transmission of more than one mobile terminal first unblanks instruction, if finger print information
For locking the outdoor finger print information identification module identification of end, the most after step s 140, enter the loudest
Should the first of arbitrary mobile terminal the state unblanking instruction in more than one mobile terminal, and at lock end
Indoor finger print information identification module re-recognizes and verifies and arbitrary movement in more than one mobile terminal
The first lock and the second lock is opened after the finger print information success that terminal is associated.
Such as, user A carries terminal 1 (finger print information of user A and the terminal 1 that can be used for unblanking
End message association), user B carries the terminal 2 (finger print information of user B that can be used for unblanking
Associate with the end message of terminal 2), and simultaneously near lock end;Lock end receives terminal 1 and terminal 2
First unblank to open the first lock after instruction, outdoor finger print information identification module recognizes user A and use
After one of them the finger print information finger print information of user A (assume be) of family B, lock end is the most permissible
Open the second lock;Afterwards, lock end default user A and user B enters indoor, and therefore lock end is not
Respond the first of terminal 1 and terminal 2 again to unblank instruction;And user A or user B is when going out, lock
The indoor finger print information identification module of end re-recognizes and verifies user A or the finger print information of user B
The first lock and the second lock is opened after success.Owing to end message and finger print information are associated, therefore pass through
After finger print information judges that user A or user B goes out, lock end exits no longer response terminal 1 or terminal 2
First unblank instruction state.
Mobile terminal may need directly to unblank in long-range realization, therefore can be with giving mobile terminal with far
The function that journey is directly unblanked.Lock brings out in security consideration, should not possess and communicate with mobile terminal remote
Function.Therefore, it can to utilize with lock end can the bluetooth link terminal that is connected of bluetooth to realize this function,
And bluetooth link terminal needs to be provided simultaneously with blue-teeth data and connects and the ability of telecommunication, i.e. in bluetooth
The terminal that continues can receive the remote unlocking instruction that mobile terminal sends, and generates according to remote unlocking instruction
The second of blue-teeth data form unblanks to instruct.In present intelligent appliance, many household appliances are permissible
Serve as the role of bluetooth link terminal, or can be to lock the bluetooth link terminal that end is separately configured,
It can be positioned over the place near lock end when using.Therefore, bluetooth link terminal was not made at this
Many descriptions.
In certain embodiments, bluetooth link terminal can without possessing the ability of telecommunication, but
Possess the ability connecting WiFi network, such as, connect the ability of WiFi router.I.e. bluetooth relaying is eventually
The remote unlocking instruction that end forwards for receiving local router, and generate indigo plant according to remote unlocking instruction
The second of tooth data mode unblanks to instruct;Wherein, remote unlocking instruction is led to by long-range by mobile terminal
Letter passage is sent to local router.Telecommunication passage can include mobile data network or WiFi
Network, i.e. mobile terminal can be real with local router by mobile data network or WiFi network
Now connect;Then, the remote unlocking received from mobile terminal instruction is transmitted to bluetooth by local router
Link terminal unblanks to instruct to generate second.
Realize the function of remote unlocking to study carefully root and need on earth being applied to Bluetooth function, if thus lock
The duty of end possesses guard mode and normal condition, and remote unlocking function can only be in working order
Normal condition can be used.
Therefore, when the duty locking end is normal condition, lock end can also carry out following steps,
Fig. 2 is the method schematic diagram of Intelligent unlocking in normal state of an embodiment, incorporated by reference to Fig. 2.
Step S210: trust the second of communication interface reception bluetooth link terminal transmission by bluetooth and open
Lock instruction.Second instruction instruction of unblanking with first of unblanking is similar, is all bluetooth number based on Bluetooth protocol
According to bag, including code and the end message of unblanking, end message can include the unique of bluetooth link terminal
Identification information, lock end is after the second of bluetooth link terminal transmission is unblanked to instruct identifying, it is not necessary to warp
Cross the checking of judgement Bluetooth signal intensity (i.e. carrying out step S220).Wherein, bluetooth link terminal
For receiving the remote unlocking instruction that mobile terminal sends, and generate bluetooth number according to remote unlocking instruction
Unblank to instruct according to the second of form.
Step S220: obtain second unblank instruction in end message and verify.Proof procedure is with upper
Stating step S130 to be similar to, lock end (can comprise bluetooth relaying eventually by the trust user profile prestored
The unique identification information of end) end message is verified, do not repeat them here.
Step S230: when end message is proved to be successful, response second instruction of unblanking is carried out unblanking behaviour
Make.Equally, unlocking operation includes that locking end directly unblanks or lock end to provide the permission manually unblanked.Directly
Unblank can be directly to open lock end so that door is opened;Allowing that lock end offer is manually unblanked is table
Show lock end need door just to be made to open through manually unblanking after unlocking operation, lock end unlocking operation it
Before cannot manually unblank.
Fig. 3 is the smart lock module diagram of an embodiment.
Based on above-mentioned Intelligent unlocking method, the corresponding smart lock of one also provided below, comprising:
Pre-storing module 100, receiver module 200, monitoring modular 300, authentication module 400, execution module
500 and judge module 600.
Pre-storing module 100 is used for the trust user profile that prestores;Receiver module 200 is for believing by bluetooth
Appoint communication interface to receive the first of mobile terminal transmission to unblank to instruct;Monitoring modular 300 is used for obtaining indigo plant
Tooth signal intensity, and it is pre-conditioned to judge whether Bluetooth signal intensity meets;Authentication module 400 is used for
When meeting pre-conditioned, obtain first unblank instruction in end message and verify;Perform module
500, for when end message is proved to be successful, response first instruction of unblanking carries out unlocking operation;Sentence
Disconnected module 600 sends for trusting communication interface reception mobile terminal at receiver module 200 by bluetooth
First unblank instruction before judge duty.
Judge module 600 is used for judging duty.
Lock end can be preset with multiple duty.Here duty, for locking the duty of end,
Multiple predefined or user-defined duty can be included, such as, can include normal shape
State, guard mode, mode state etc. is set.In the following description, the main lock end that describes is in work
Time normal condition and guard mode, and lock the end setting when user setup parameter or user profile
Mode state.It is appreciated that duty can also include other duties freely defined.
Normal condition, is defined as locking end state in which normal use when, in this condition,
All unlocking functions of lock end can be used.And guard mode, then it is defined as locking end in protection
State in which under pattern, in this condition, the part unlocking function of lock end is rejected use.Refused
The part unlocking function used absolutely can be arranged voluntarily by user, it is also possible to pre-when being product export
If.Such as, when family have child and be grown up cannot guard at any time time, need in view of safety factors
And the unlocking function that part is easily used by child is disabled, this kind of unlocking function such as includes by moving
The function that dynamic terminal Bluetooth is unblanked, the function unblanked by integrated circuit card or only by password with regard to energy
The function unblanked.
Therefore, it is judged that module 600 needs to judge the duty of lock end, when lock end is operated in
During normal condition, receiver module 200 trust that communication interface receives that mobile terminal sends by bluetooth the
One unblanks instructs;When locking end and being operated in guard mode, perform module 500 refusal response first and unblank
Instruction.Namely when duty is guard mode, even if execution module 500 receives first and unblanks
Second instructing or being described below unblanks to instruct, all without responding.
When locking end and being operated in normal condition, receiver module 200 is trusted communication interface by bluetooth and is received
The first of mobile terminal transmission unblanks to instruct.Mobile terminal can be smart mobile phone, intelligent watch, put down
Plate computer etc. portable set.
Bluetooth trusts communication interface it can be understood as lock end carried out bluetooth with mobile terminal the most in advance
The communication interface matched and formed.Such as, lock end and mobile terminal have arrived in user's hands user again by it
Bluetooth pairing.Through lock end and the mobile terminal of a Bluetooth pairing, it is equivalent to bluetooth pre-established
Trust communication interface, so lock end and mobile terminal can directly build when bluetooth connects upper once carrying out
Vertical Trusted channel, no longer carries out Bluetooth pairing.
Therefore, first to unblank to instruct be packet based on Bluetooth protocol.In order to reduce energy consumption, permissible
Use bluetooth low energy consumption (BLE) technology.BLE technology uses interval of variable Connection Time, this
Every could be arranged to several milliseconds to several seconds according to concrete application.It addition, because BLE technology is adopted
By very quickly connected mode, may be at the most at ordinary times " disconnected " state (Standby,
Holding state) to reduce energy consumption, now both link ends the most simply knows the other side, only in necessity
Time just open link, then within the shortest time close link.Therefore, mobile terminal is not
Need to send first to unblank to may be at holding state when of instruction, send first at needs and unblank to refer to
Time the when of order (after such as identifying corresponding incoming event), mobile terminal switches from holding state
To broadcast state to send broadcast message.Mobile terminal is during sending broadcast message, it is common that in advance
If broadcast duration periodically send broadcast message.
First instruction of unblanking includes unblank code and end message.End message includes that mobile terminal is only
One identification information or mandate account information.In the present embodiment, account information is authorized to include by lock end straight
The mandate account connecing mandate or the temporary Authorization account indirectly authorized by the mobile terminal with authorization privilege
Number.
The unique identification information of mobile terminal, for uniquely identifying mobile terminal, can be mobile terminal
Physical address (MAC), it is also possible to be the IMEI of mobile terminal.When end message includes mobile whole
During the unique identification information held, the unique identification information of the mobile terminal of authentication module 400 checking, and
Just unblank after being proved to be successful, as long as in other words lock end identifies mobile terminal and can unblank.
Authorizing account information can be divided into two kinds, the first is the mandate account directly authorized by lock end,
The second is the mandate account indirectly authorized by the mobile terminal with authorization privilege.The first can be
The mandate account of lock end direct giving mobile terminal when that lock end and mobile terminal setting up data cube computation,
This mandate account is stored in white list by locking end, belongs to permanent effective account;The second can be
The temporary Authorization account given to other mobile terminals again by the mobile terminal directly authorized by lock end
Number, temporary Authorization account here can be that mobile terminal is according to authorizing account and the create-rule preset
(algorithm) generates, and this temporary Authorization account, can be by owing to having mapping contact with authorizing account
Lock end identification, belongs to the effective account of short-term or disposable account (be used only once or for several times).
Such as, for mobile terminal 1, the lock direct giving mobile terminal of end 1 forever effectively authorizes account
Number A, mobile terminal 1 can use mandate account A to unblank;Mobile terminal 1 can also basis
Account A and generating algorithm K preset is authorized to generate temporary Authorization account a, and by temporary Authorization account
A is sent to mobile terminal 2, and mobile terminal 2 re-uses temporary Authorization account a and unblanks, and lock end is being received
After temporary Authorization account a, generating algorithm K is utilized to identify as authorizing account A indirectly to authorize
Account, thus lock end and unblank so that mobile terminal 2 can utilize temporary Authorization account a to unblank.
Temporary Authorization account a is the effective account of short-term or disposable account, such as can only be in 5 minutes
Effectively or be used only once or for several times.
When temporary Authorization account a is the effective account of short-term, mobile terminal 1 needs to authorize account
The generation moment T of a sends a mobile terminal 2, and therefore lock end and mobile terminal 1 need have synchronization
Time, this can pre-set lock in time.Such as at T sometime, mobile terminal 1
According to authorizing account A, generating algorithm K and generating moment T generation temporary Authorization account a, lock end obtains
Generating algorithm K is utilized to identify mandate account A and generate moment T after taking temporary Authorization account a, from
And the effective time generating moment T deduction temporary Authorization account a can be utilized.
First unblank instruction the pattern of BLE broadcast message can be used to send.
In BLE technology, usual broadcast message has a data below structure:
Preamble | Access Address | PDU | CRC |
1 (byte) | 4 (bytes) | 2-39 (byte) | 3 (bytes) |
0x25 |
Preamble is preamble, and Access Address is reference address, and PDU is payload
Data, CRC is check code.
PDU data has a data below structure:
Wherein Header is data head, and Payload is load data.Payload is divided into two parts,
AdvA is broadcast address, and AdvData is broadcast data.Header generally includes broadcast-type information,
Such as:
ADV_IND: omnidirectional broadcast can be connected
ADV_DIRECT_IND: directional broadcasting can be connected
ADV_NONCONN_IND: omnidirectional broadcast can not be connected
ADV_SCAN_IND: omnidirectional broadcast can be scanned
Therefore, the physical address (MAC) of mobile terminal can be positioned over AdvA, and code of unblanking
And/or end message (such as authorizing account information) can be positioned over AdvData.
In the present embodiment, the first instruction of unblanking can be that the authentication module 400 of mobile terminal refers in checking
Send after the success of stricture of vagina information.Namely before sending first and unblanking to instruct, authentication module 400 may require that
Obtain the finger print information of user and verify, unblanking to instruct by just sending first after fingerprint authentication.First
Instruction of unblanking can be that mobile terminal sends after identifying default incoming event, i.e. user mobile eventually
End just sends first after carrying out corresponding input operation and unblanks to instruct.First unblank instruction can also be
Mobile terminal begins to send voluntarily the when of lock end being detected.
Below instruction of only unblanking to first is illustrated, and in fact the first instruction of unblanking can be it
His data mode, as long as meeting Bluetooth protocol.
Receiver module 200 receive first unblank instruction after, monitoring modular 300 obtains Bluetooth signal intensity,
And it is pre-conditioned to judge whether Bluetooth signal intensity meets.Bluetooth signal intensity can use RSSI value table
Show, receiver module 200 get first unblank instruction after, Bluetooth signal intensity level can be obtained, and
Judge whether Bluetooth signal intensity meets pre-conditioned.The technology obtaining Bluetooth signal intensity belongs to conventional
Technology, does not repeats them here.The size of Bluetooth signal intensity and standoff distance have close ties, pass through
Judge that the size of Bluetooth signal intensity may determine that the distance between mobile terminal and lock end;If it is mobile
Distance less (e.g., less than 10cm) between terminal and lock end, shows that user will move eventually
End intends to unblank near lock end.When mobile terminal and lock end between distance less time just think that user beats
Unblanking, can be prevented effectively from the phenomenon opening by mistake lock, the coverage of Bluetooth signal is bigger after all
(tens meters even tens meters).
When Bluetooth signal intensity meets pre-conditioned, show that mobile terminal is the least with the distance of lock end
In predeterminable range (such as 10cm), show that mobile terminal is intended to unblank by user near lock end,
Now, authentication module 400 obtain first unblank instruction in end message and verify.Authentication module
End message can be verified by 400 by the trust user profile prestored, the trust user prestored
Information includes the trust user profile more than one group, has different user's power between the user of different groups
Limit.Such as, the trust user profile prestored can include manager, member two groups.Group of administrators
Manager has unlocking authority, the authority giving other mobile terminal temporary Authorization accounts and management lock end
Authority, and member group member only there is unlocking authority.
Authentication module 400 is by verifying the unique identification information of the mobile terminal in above-mentioned end message
Or authorize whether account information is present in the trust user profile prestored, judge mobile phone users
Whether there is unlocking authority.Being present in which group, user then has the user right that this group is corresponding.Example
The trust user authorizing account A to belong to group of administrators described above, therefore authorizes account A to have tax
Give the authority of other mobile terminal temporary Authorization accounts.
The trust user profile prestored, pre-storing module 100 can utilize following pre-storage method to realize:
Initially set up the Trusted channel with mobile terminal, then obtain the user profile that mobile terminal provides,
The corresponding user right of user of rear imparting user profile also is stored as trusting user profile.The present embodiment
In, set up the Trusted channel with mobile terminal, may is that the bluetooth set up with mobile terminal is trusted even
Connect;Or may is that by showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
In brief, lock end data cube computation during user profile is trusted in storage, can be by indigo plant
The mode of tooth communication and mobile terminal are set up bluetooth Trusted channel and are realized, when lock end is joined with mobile terminal
To rear, its end message is sent to lock end and trusts user profile to be formed by mobile terminal;Or,
Mobile terminal (can be implied with unique mark of lock end by the 2 D code information that scanning lock end is shown
Information) realize and connection and the binding locking end, and be sent to its end message lock end to form letter
Appoint user profile.
When end message is proved to be successful, performs module 500 and respond the first instruction of unblanking and carry out unblanking behaviour
Make.Unlocking operation includes that locking end directly unblanks or lock end to provide the permission manually unblanked.Directly unblanking can
Being directly to open lock end so that door is opened;Allowing that lock end offer is manually unblanked is to represent lock end
Needing door just to be made to open through manually unblanking after unlocking operation, lock end cannot before unlocking operation
Manually unblank.
In order to improve the safety of lock end, smart lock can include the first lock and the second lock, and includes
Finger print information identification module (not shown).Unlocking operation can be unlatching first in certain embodiments
Lock.When end message is proved to be successful, performs module 500 and respond the first instruction of unblanking and carry out unblanking behaviour
After work, finger print information identification module also identifies and verifies finger print information, and opens after being proved to be successful
Second lock.
Open the first lock by checking end message, open the second lock by checking finger print information, therefore
End message and finger print information can be to be mutually related, i.e. end message and finger print information has mapping
Relation.
When Bluetooth signal intensity meets pre-conditioned, show that mobile terminal is the least with the distance of lock end
In predeterminable range, show that mobile terminal is intended to unblank by user near lock end, above-mentioned preset away from
From can be very close to distance, such as 10cm;Can also be nearer distance, such as 1~2 meter.
Therefore, if predeterminable range is nearer distance, mobile terminal can need not lock end, and
When mobile terminal is from lock end 1~the distance of 2 meters, lock end can automated to respond to end message and unblanks, more
Add conveniently.But, if user carries mobile terminal and enters indoor, if now in indoor through lock
End, then be relatively easy to open by mistake lock or the situation of mobile terminal prompting by mistake.
Therefore, finger print information identification module can include outdoor finger print information identification module and indoor fingerprint
Information identification module, and avoid the above-mentioned feelings opening by mistake lock or mobile terminal prompting by mistake in the following manner
Condition:
If finger print information is outdoor finger print information identification module identification, then at outdoor finger print information identification mould
Block identification and verify finger print information and perform module 500 opens after being proved to be successful second lock after, hold
Row module 500 enters and no longer responds the state that the first of mobile terminal unblanks to instruct, and at indoor fingerprint
Information identification module opens the first lock and the second lock after re-recognizing and verify finger print information success.
Under aforesaid way, user carries mobile terminal and unblanks to enter behind indoor, even if user carries shifting
Dynamic terminal is in indoor near lock end, and what smart lock also will not respond that mobile terminal sends first unblanks
Instruct and auto-unlocking;If user goes out, even if not carrying mobile terminal, user can also be in room
In by fingerprint in indoor realization unblank.If user carries outside mobile terminal unblanked by fingerprint
Go out, then need to exit no longer responding the state that the first of described mobile terminal unblanks to instruct, to facilitate use
Return to unblank next time in family.Therefore, the indoor finger print information identification module at lock end re-recognizes and verifies
After opening the first lock and the second lock after finger print information success, exit and no longer respond the first of this mobile terminal
Unblank instruction state.
Under aforesaid way, it should also be taken into account that multiple user carries the feelings of mobile device that can be used for unblanking
Condition.When be simultaneously received the transmission of more than one mobile terminal first unblanks instruction, if finger print information
For outdoor finger print information identification module identification, then refer in outdoor finger print information identification module identification checking
After stricture of vagina information and execution module 500 open the second lock after being proved to be successful, perform module 500 and enter
No longer respond in more than one mobile terminal the first of arbitrary mobile terminal the state unblanking instruction, and
Indoor finger print information identification module re-recognizes and verifies and arbitrary movement in more than one mobile terminal
The first lock and the second lock is opened after the finger print information success that terminal is associated.
Such as, user A carries terminal 1 (finger print information of user A and the terminal 1 that can be used for unblanking
End message association), user B carries the terminal 2 (finger print information of user B that can be used for unblanking
Associate with the end message of terminal 2), and simultaneously near smart lock;Smart lock receives terminal 1 and end
The first of end 2 unblanks to open the first lock after instruction, and outdoor finger print information identification module recognizes user A
After one of them the finger print information finger print information of user A (assume be) of user B, smart lock
I.e. can open the second lock;Afterwards, smart lock default user A and user B enters indoor, because of
This smart lock no longer responds the first of terminal 1 and terminal 2 and unblanks instruction;And user A or user B
When going out, the indoor finger print information identification module of smart lock re-recognizes and verifies user A or user B
Finger print information success after open first lock and second lock.Owing to end message is relevant with finger print information
Connection, after therefore judging that user A or user B goes out by finger print information, smart lock exits the loudest
The first of terminal 1 or terminal 2 is answered to unblank the state of instruction.
Mobile terminal may need directly to unblank in long-range realization, therefore can be with giving mobile terminal with far
The function that journey is directly unblanked.Lock brings out in security consideration, should not possess and communicate with mobile terminal remote
Function.Therefore, it can to utilize with lock end can the bluetooth link terminal that is connected of bluetooth to realize this function,
And bluetooth link terminal needs to be provided simultaneously with blue-teeth data and connects and the ability of telecommunication, i.e. in bluetooth
The terminal that continues can receive the remote unlocking instruction that mobile terminal sends, and generates according to remote unlocking instruction
The second of blue-teeth data form unblanks to instruct.In present intelligent appliance, many household appliances are permissible
Serve as the role of bluetooth link terminal, or can be to lock the bluetooth link terminal that end is separately configured,
It can be positioned over the place near lock end when using.Therefore, bluetooth link terminal was not made at this
Many descriptions.
In certain embodiments, bluetooth link terminal can without possessing the ability of telecommunication, but
Possess the ability connecting WiFi network, such as, connect the ability of WiFi router.I.e. bluetooth relaying is eventually
The remote unlocking instruction that end forwards for receiving local router, and generate indigo plant according to remote unlocking instruction
The second of tooth data mode unblanks to instruct;Wherein, remote unlocking instruction is led to by long-range by mobile terminal
Letter passage is sent to local router.Telecommunication passage can include mobile data network or WiFi
Network, i.e. mobile terminal can be real with local router by mobile data network or WiFi network
Now connect;Then, the remote unlocking received from mobile terminal instruction is transmitted to bluetooth by local router
Link terminal unblanks to instruct to generate second.
Realize the function of remote unlocking to study carefully root and need on earth being applied to Bluetooth function, if thus lock
The duty of end possesses guard mode and normal condition, and remote unlocking function can only be in working order
Normal condition can be used.
Therefore, when the duty locking end is normal condition, receiver module 200 is additionally operable to by indigo plant
Tooth trust communication interface receives the second of bluetooth link terminal transmission and unblanks to instruct;Authentication module 400 is also
For obtain second unblank instruction in end message and verify;When described end message is proved to be successful
Time, perform module 500 and be additionally operable to respond the second instruction of unblanking and carry out unlocking operation.Detailed process is as follows:
Receiver module 200 is trusted communication interface by bluetooth and is received the second of the transmission of bluetooth link terminal
Unblank to instruct.Second instruction instruction of unblanking with first of unblanking is similar, is all bluetooth based on Bluetooth protocol
Packet, including code and the end message of unblanking, end message can include bluetooth link terminal only
One identification information, lock end is after the second of bluetooth link terminal transmission is unblanked to instruct identifying, it is not necessary to
Through judging Bluetooth signal strength modification.Wherein, bluetooth link terminal is used for receiving mobile terminal transmission
Remote unlocking instruction, and according to remote unlocking instruction generate blue-teeth data form second unblank refer to
Order.
Authentication module 400 obtain second unblank instruction in end message and verify.Proof procedure is with upper
Stating step S130 to be similar to, authentication module 400 (can comprise indigo plant by the trust user profile prestored
The unique identification information of tooth link terminal) end message is verified, do not repeat them here.
When end message is proved to be successful, performs module 500 and respond the second instruction of unblanking and carry out unblanking behaviour
Make.Equally, unlocking operation includes that locking end directly unblanks or lock end to provide the permission manually unblanked.Directly
Unblank can be directly to open lock end so that door is opened;Allowing that lock end offer is manually unblanked is table
Show lock end need door just to be made to open through manually unblanking after unlocking operation, lock end unlocking operation it
Before cannot manually unblank.
It is appreciated that above-mentioned smart lock, it is also possible to possess fingerprint recognition, iris identification, password defeated
Enter and integrated circuit card such as is unblanked at the conventional function, do not repeat them here.
Above-mentioned Intelligent unlocking method and smart lock, trust communication interface by bluetooth and receive mobile terminal
First sent unblanks to instruct;Obtain Bluetooth signal intensity, and judge whether Bluetooth signal intensity meets
Pre-conditioned;When meeting pre-conditioned, obtain first unblank instruction in end message and verify;
When end message is proved to be successful, response the first instruction of unblanking carries out unlocking operation;Utilize mobile terminal
Bluetooth module transmission instruction of unblanking go to unblank, unlocking operation can be saved, save time, convenience
Preferably;And can realize unblanking just with the mobile terminal carried with, it is not necessary to use extra
Unlocking tool, convenience improves further.
Although it should be understood that Fig. 1,2 flow chart in each step according to the instruction of arrow
Show successively, but these steps are not the inevitable order indicated according to arrow to be performed successively.Unless
Expressly stating otherwise herein, the not strictest order that performs of these steps limits, and it can be with
Other order performs.And, Fig. 1, at least some of step in 2 can include multiple sub-step
In rapid or multiple stages, these sub-steps or stage are not necessarily to have performed at synchronization,
But can perform in the different moment, its execution sequence is also not necessarily and carries out successively, but permissible
With other steps or the sub-step of other steps or stage at least some of the most in turn or alternately
Ground performs.
The above is only the some embodiments of the present invention, it is noted that for the art
For those of ordinary skill, under the premise without departing from the principles of the invention, it is also possible to make some improvement
And retouching, these improvements and modifications also should be regarded as protection scope of the present invention.
Claims (10)
1. an Intelligent unlocking method, is applied to lock end, it is characterised in that comprise the steps:
Trust the first of communication interface reception mobile terminal transmission by bluetooth to unblank to instruct;
Obtain Bluetooth signal intensity, and it is pre-conditioned to judge whether Bluetooth signal intensity meets;
When meeting pre-conditioned, obtain first unblank instruction in end message and verify;
When described end message is proved to be successful, response the first instruction of unblanking carries out unlocking operation.
Intelligent unlocking method the most according to claim 1, it is characterised in that described terminal is believed
Breath includes the unique identification information of described mobile terminal or authorizes account information.
Intelligent unlocking method the most according to claim 2, it is characterised in that described mandate account
Number information includes the mandate account directly authorized by lock end or by having between the mobile terminal of authorization privilege
Connect the temporary Authorization account of mandate.
Intelligent unlocking method the most according to claim 1, it is characterised in that by prestore
Trust user profile end message is verified.
Intelligent unlocking method the most according to claim 4, it is characterised in that described in prestore
Trust user profile and include the trust user profile more than one group, between the user of different groups, there is difference
User right.
Intelligent unlocking method the most according to claim 4, it is characterised in that described in prestore
The pre-storage method trusting user profile includes:
Set up the Trusted channel with mobile terminal;
Obtain the user profile that mobile terminal provides;
Give the corresponding user right of user of described user profile and be stored as trusting user profile.
Intelligent unlocking method the most according to claim 6, it is characterised in that described foundation with
The Trusted channel of mobile terminal includes:
Set up the bluetooth Trusted channel with mobile terminal;
Or
By showing that Quick Response Code for mobile scanning terminal and sets up Trusted channel.
Intelligent unlocking method the most according to claim 1, it is characterised in that believed by bluetooth
Before appointing the first of communication interface reception mobile terminal transmission to unblank to instruct, also include judging duty
Step, when duty is normal condition, just perform by bluetooth trust communication interface receive move
Move the step that the first of terminal transmission is unblanked to instruct.
Intelligent unlocking method the most according to claim 8, it is characterised in that work as duty
During for normal condition, also execute the following steps:
Trust the second of communication interface reception bluetooth link terminal transmission by bluetooth to unblank to instruct;
Obtain second unblank instruction in end message and verify;
When described end message is proved to be successful, response the second instruction of unblanking carries out unlocking operation;
Wherein, the remote unlocking instruction that described bluetooth link terminal sends for receiving mobile terminal, and
Generate the second of blue-teeth data form according to the instruction of described remote unlocking to unblank to instruct.
10. a smart lock, it is characterised in that including:
Receiver module, unblanks for trusting the first of communication interface reception mobile terminal transmission by bluetooth
Instruction;
Monitoring modular, is used for obtaining Bluetooth signal intensity, and it is pre-to judge whether Bluetooth signal intensity meets
If condition;
Authentication module, when meeting pre-conditioned, for obtaining the first end message unblanked in instruction
And verify;And
Perform module, when described end message is proved to be successful, carry out for response the first instruction of unblanking
Unlocking operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610245086.3A CN105931330B (en) | 2016-04-19 | 2016-04-19 | Intelligent unlocking method and smart lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610245086.3A CN105931330B (en) | 2016-04-19 | 2016-04-19 | Intelligent unlocking method and smart lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105931330A true CN105931330A (en) | 2016-09-07 |
CN105931330B CN105931330B (en) | 2019-03-05 |
Family
ID=56839487
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610245086.3A Active CN105931330B (en) | 2016-04-19 | 2016-04-19 | Intelligent unlocking method and smart lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105931330B (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106683246A (en) * | 2016-12-23 | 2017-05-17 | 深圳怡化电脑股份有限公司 | Safety door access control method and system |
CN106846582A (en) * | 2017-02-07 | 2017-06-13 | 武汉盛硕电子有限公司 | A kind of intelligent door lock control method |
CN106846584A (en) * | 2017-02-13 | 2017-06-13 | 上海量明科技发展有限公司 | Shared bicycle and its unlocking method, lockset, terminal and system |
CN106934884A (en) * | 2017-01-19 | 2017-07-07 | 云丁网络技术(北京)有限公司 | A kind of method and its system of the intelligent door lock auto-unlocking based on mobile device |
CN108338641A (en) * | 2017-01-25 | 2018-07-31 | 致伸科技股份有限公司 | Has the mailbox of wireless communication function |
CN109104430A (en) * | 2018-09-27 | 2018-12-28 | 西安艾润物联网技术服务有限责任公司 | Auth method, device and computer readable storage medium |
WO2019023975A1 (en) * | 2017-08-02 | 2019-02-07 | 福建联迪商用设备有限公司 | Method and system for automatic unlocking and locking of pos machine |
CN109697797A (en) * | 2017-10-20 | 2019-04-30 | 山东新北洋信息技术股份有限公司 | A kind of express mail cabinet, express mail cabinet control method and express mail cabinet control device |
CN109887127A (en) * | 2017-12-06 | 2019-06-14 | 深圳中智科创机器人有限公司 | A kind of intelligent door lock and its control method and system |
CN109920113A (en) * | 2019-03-13 | 2019-06-21 | 苏州华盖信息科技有限公司 | The control method and intelligent lock system of intelligent lock system |
CN110009768A (en) * | 2018-01-04 | 2019-07-12 | 台湾福兴工业股份有限公司 | Electronic lock and its control method |
CN110086864A (en) * | 2019-04-23 | 2019-08-02 | 厦门中锐电力科技有限公司 | A method of it is managed offline using lockset dual key |
CN111758248A (en) * | 2020-02-14 | 2020-10-09 | 深圳市汇顶科技股份有限公司 | Method, device and chip for automatically identifying identity |
CN112446985A (en) * | 2019-08-14 | 2021-03-05 | 云丁网络技术(北京)有限公司 | Intelligent door lock unlocking method and device |
CN113256852A (en) * | 2021-05-13 | 2021-08-13 | 艾美达(天津)车业有限公司 | Method and system for controlling unlocking and locking of intelligent vehicle |
CN114049704A (en) * | 2021-11-03 | 2022-02-15 | 珠海格力电器股份有限公司 | Door lock control method and device, electronic equipment and storage medium |
CN114399854A (en) * | 2021-12-30 | 2022-04-26 | 荣耀终端有限公司 | Unlocking method of intelligent door lock, mobile device and storage medium |
CN115273278A (en) * | 2022-03-16 | 2022-11-01 | 浙江利尔达物联网技术有限公司 | Approaching automatic unlocking method based on BLE HID PROFILE |
US11538298B2 (en) | 2019-08-06 | 2022-12-27 | Yunding Network Technology (Beijing) Co., Ltd. | Devices and methods for controlling smart lock |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101260755A (en) * | 2007-03-08 | 2008-09-10 | 英华达(上海)科技有限公司 | Unlocking system and method |
CN102610009A (en) * | 2011-07-25 | 2012-07-25 | 宋功彬 | Multi-user management access control system |
CN103150798A (en) * | 2013-03-15 | 2013-06-12 | 李凯 | Door control system |
CN103679872A (en) * | 2013-11-12 | 2014-03-26 | 佛山市南海可得乐五金电子有限公司 | System for unlocking door lock based on fingerprint and operating method and device |
CN104050743A (en) * | 2014-06-30 | 2014-09-17 | 重庆米润科技有限公司 | Fortification monitoring system and method of access control system |
CN104157061A (en) * | 2014-08-21 | 2014-11-19 | 贵州华尚高新技术有限公司 | Non-contact unlocking method and system |
CN104732636A (en) * | 2015-04-14 | 2015-06-24 | 重庆特斯联科技有限公司 | Bluetooth cellphone-based intelligent community access control system and method |
CN105155995A (en) * | 2015-09-03 | 2015-12-16 | 上海电机学院 | Safety door system and using method thereof |
-
2016
- 2016-04-19 CN CN201610245086.3A patent/CN105931330B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101260755A (en) * | 2007-03-08 | 2008-09-10 | 英华达(上海)科技有限公司 | Unlocking system and method |
CN102610009A (en) * | 2011-07-25 | 2012-07-25 | 宋功彬 | Multi-user management access control system |
CN103150798A (en) * | 2013-03-15 | 2013-06-12 | 李凯 | Door control system |
CN103679872A (en) * | 2013-11-12 | 2014-03-26 | 佛山市南海可得乐五金电子有限公司 | System for unlocking door lock based on fingerprint and operating method and device |
CN104050743A (en) * | 2014-06-30 | 2014-09-17 | 重庆米润科技有限公司 | Fortification monitoring system and method of access control system |
CN104157061A (en) * | 2014-08-21 | 2014-11-19 | 贵州华尚高新技术有限公司 | Non-contact unlocking method and system |
CN104732636A (en) * | 2015-04-14 | 2015-06-24 | 重庆特斯联科技有限公司 | Bluetooth cellphone-based intelligent community access control system and method |
CN105155995A (en) * | 2015-09-03 | 2015-12-16 | 上海电机学院 | Safety door system and using method thereof |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106683246A (en) * | 2016-12-23 | 2017-05-17 | 深圳怡化电脑股份有限公司 | Safety door access control method and system |
CN106934884A (en) * | 2017-01-19 | 2017-07-07 | 云丁网络技术(北京)有限公司 | A kind of method and its system of the intelligent door lock auto-unlocking based on mobile device |
CN108338641A (en) * | 2017-01-25 | 2018-07-31 | 致伸科技股份有限公司 | Has the mailbox of wireless communication function |
CN106846582A (en) * | 2017-02-07 | 2017-06-13 | 武汉盛硕电子有限公司 | A kind of intelligent door lock control method |
CN106846584A (en) * | 2017-02-13 | 2017-06-13 | 上海量明科技发展有限公司 | Shared bicycle and its unlocking method, lockset, terminal and system |
WO2019023975A1 (en) * | 2017-08-02 | 2019-02-07 | 福建联迪商用设备有限公司 | Method and system for automatic unlocking and locking of pos machine |
CN109697797A (en) * | 2017-10-20 | 2019-04-30 | 山东新北洋信息技术股份有限公司 | A kind of express mail cabinet, express mail cabinet control method and express mail cabinet control device |
CN109887127A (en) * | 2017-12-06 | 2019-06-14 | 深圳中智科创机器人有限公司 | A kind of intelligent door lock and its control method and system |
CN110009768A (en) * | 2018-01-04 | 2019-07-12 | 台湾福兴工业股份有限公司 | Electronic lock and its control method |
CN109104430A (en) * | 2018-09-27 | 2018-12-28 | 西安艾润物联网技术服务有限责任公司 | Auth method, device and computer readable storage medium |
CN109920113A (en) * | 2019-03-13 | 2019-06-21 | 苏州华盖信息科技有限公司 | The control method and intelligent lock system of intelligent lock system |
CN110086864A (en) * | 2019-04-23 | 2019-08-02 | 厦门中锐电力科技有限公司 | A method of it is managed offline using lockset dual key |
CN110086864B (en) * | 2019-04-23 | 2021-10-08 | 厦门中锐电力科技有限公司 | Method for offline management and control by using double keys of lock |
US11538298B2 (en) | 2019-08-06 | 2022-12-27 | Yunding Network Technology (Beijing) Co., Ltd. | Devices and methods for controlling smart lock |
US11823510B2 (en) | 2019-08-06 | 2023-11-21 | Yunding Network Technology (Beijing) Co., Ltd. | Devices and methods for controlling smart lock |
CN112446985A (en) * | 2019-08-14 | 2021-03-05 | 云丁网络技术(北京)有限公司 | Intelligent door lock unlocking method and device |
CN111758248A (en) * | 2020-02-14 | 2020-10-09 | 深圳市汇顶科技股份有限公司 | Method, device and chip for automatically identifying identity |
CN113256852A (en) * | 2021-05-13 | 2021-08-13 | 艾美达(天津)车业有限公司 | Method and system for controlling unlocking and locking of intelligent vehicle |
CN114049704A (en) * | 2021-11-03 | 2022-02-15 | 珠海格力电器股份有限公司 | Door lock control method and device, electronic equipment and storage medium |
CN114049704B (en) * | 2021-11-03 | 2023-01-13 | 珠海格力电器股份有限公司 | Door lock control method and device, electronic equipment and storage medium |
CN114399854A (en) * | 2021-12-30 | 2022-04-26 | 荣耀终端有限公司 | Unlocking method of intelligent door lock, mobile device and storage medium |
CN115273278A (en) * | 2022-03-16 | 2022-11-01 | 浙江利尔达物联网技术有限公司 | Approaching automatic unlocking method based on BLE HID PROFILE |
Also Published As
Publication number | Publication date |
---|---|
CN105931330B (en) | 2019-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105931330A (en) | Intelligent unlocking method and intelligent lock | |
CN102547680B (en) | System of internet of things and safety management method for system of internet of things | |
CN105100010B (en) | A kind of method for accessing network and each relevant device | |
KR101242122B1 (en) | Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus | |
US8229358B2 (en) | Identification, authentication and coverage control method | |
US20060109966A1 (en) | Home security system | |
US20130331027A1 (en) | Communications system providing remote access via mobile wireless communications device and related methods | |
CN103634795B (en) | Radio communication device and method | |
CN104157029A (en) | Access control system, mobile terminal based control method thereof and mobile terminal | |
KR20090122970A (en) | Wireless communication techniques for controlling access granted by a security device | |
CN106604266A (en) | Intelligent equipment system connection method, intelligent equipment and intelligent equipment access system | |
CN103220669A (en) | Share method, system, server, terminal and gateway management server of private wireless local area network (WLAN) | |
CN101547444B (en) | Method for providing special access process to different terminals in WLAN | |
CN104050742A (en) | Intelligent door and control method and system thereof | |
CN101820344A (en) | AAA server, home network access method and system | |
CN103517272B (en) | Wireless network user authentication system and wireless network connection method thereof | |
CN105577805A (en) | Remote control method of safe box and control system for realizing the method | |
EP2672464A1 (en) | Communications system providing remote access via mobile wireless communications device and related methods | |
CN110858971A (en) | Intelligent device network distribution method and system | |
CN104853354A (en) | Bluetooth authentication method and system thereof | |
CN104902470B (en) | A kind of connection control method and system of the hotspot based on dynamic key | |
CN111989723B (en) | Sharing system | |
Suomalainen | Smartphone assisted security pairings for the Internet of Things | |
CN105516974A (en) | Router connection method, terminal and router | |
CN107944709A (en) | A kind of training space Sharing Management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220715 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |
|
TR01 | Transfer of patent right |